„Obfuscation“
Suchergebnisse
1.000+ Treffer
-
Confusopoly: competition and obfuscation in markets
-
Obfuscation and rational inattention in digitalized markets
-
Blame shifting and blame obfuscation: The blame avoidance effects of delegation in the European Union
-
Leveraging deep learning-assisted attacks against image obfuscation via federated learning
-
Scalable and language-independent embedding-based approach for plagiarism detection considering obfuscation type: no training phase
-
New Perspectives on Sequential Reverse Engineering and Obfuscation
-
On Security Notions for Multi-Party Computation
-
On Foundations of Protecting Computations
-
Android Application Hardening: Attack Surface Reduction and IP Protection Mechanisms
-
Cryptographic Protocols from Physical Assumptions
-
Emerging Threats to Online Security: Securing Systems Against Unauthorized Automation and Web Bots
-
Mitigating Automated Obfuscation Attacks on Software Plagiarism Detection Systems
-
Mitigating Automated Obfuscation Attacks on Software Plagiarism Detection Systems
-
Advances in digital forensics V – revised selected papers
-
Guest Editorial: Hardware Reverse Engineering and Obfuscation
-
Advances in Digital Forensics VIII – 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers
-
Advances in Cryptology – Proceedings of Crypto 82
-
Advances in Digital Forensics VII – 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 – February 2, 2011, Revised Selected Papers
-
Information Security Practice and Experience – 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings
-
Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing